Alternatives to Quest Active Administrator

Compare Quest Active Administrator alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Quest Active Administrator in 2026. Compare features, ratings, user reviews, pricing, and more from Quest Active Administrator competitors and alternatives in order to make an informed decision for your business.

  • 1
    Rippling

    Rippling

    Rippling

    Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Automate HR tasks, ensure compliance, and streamline approvals. Simplify IT with device management, software access, and compliance monitoring, all from one dashboard. Enjoy timely payroll, real-time financial visibility, and dynamic spend policies. Rippling empowers your business to save time, reduce costs, and enhance efficiency, allowing you to focus on growth. Experience the power of unified management with Rippling today.
    Compare vs. Quest Active Administrator View Software
    Visit Website
  • 2
    Frontegg

    Frontegg

    Frontegg

    Frontegg is a Customer Identity and Access Management (CIAM) platform that simplifies authentication, authorization, and user management for SaaS companies. It enables developers to implement advanced identity features quickly, then shift ongoing administration to other teams. With Frontegg, Product, Infosec, and Customer Success teams can take control of key identity tasks like managing user roles, enforcing security policies, and handling customer requests, all without engineering support. Developers reduce toil and regain focus on core product work, while stakeholders move faster without bottlenecks. Frontegg supports modern identity features including SSO, MFA, role-based access control, entitlements, multi-tenancy, and audit logs. Its low-code platform integrates in days and provides a user-friendly admin portal that bridges technical and non-technical teams. Frontegg increases operational efficiency, improves security posture, and enhances the customer experience.
    Leader badge
    Compare vs. Quest Active Administrator View Software
    Visit Website
  • 3
    ManageEngine ADManager Plus
    ADManager Plus is a simple, easy-to-use Windows Active Directory (AD) management and reporting solution that helps AD administrators and help desk technicians in their day-to-day activities. With a centralized and intuitive web-based GUI, the software handles a variety of complex tasks like bulk management of user accounts and other AD objects, delegates role-based access to help desk technicians, and generates an exhaustive list of AD reports, some of which are an essential requirement to satisfy compliance audits. This Active Directory tool also offers mobile AD apps that empower AD admins and technicians to perform important user management tasks, on the move, right from their mobile devices. Create multiple users and groups in Office 365, manage licenses, create Exchange mailboxes, migrate mailboxes, set storage limits, add proxy addresses, and more.
    Compare vs. Quest Active Administrator View Software
    Visit Website
  • 4
    Josys

    Josys

    Josys

    Josys is the Automated Identity Governance and Administration (IGA) Platform designed to simplify how IT works. Trusted by IT teams and Managed Service Providers (MSPs), Josys delivers complete visibility and control over every user, application, and access permission within their identity perimeter. By automating critical workflows, including access review audits, lifecycle management, shadow IT detection, and license optimization, Josys transforms complex access policies and governance into seamless, autonomous processes that drastically reduce security risks, optimize spend, and unlock true operational efficiency.
  • 5
    SolarWinds Access Rights Manager
    SolarWinds® Access Rights Manager is designed to assist IT & security administrators in quickly & easily provisioning, deprovisioning, managing, & auditing user access rights to systems, data, & files, so they can help protect their organizations from the potential risks of data loss and breaches. By analyzing user authorizations & access permissions, you get visualization of who has access to what, and when they accessed it. Customized reports can be generated to help demonstrate compliance with many regulatory requirements. Provision & deprovision users via role-specific templates to help assure conformity of access privilege delegation, in alignment with security policies.
  • 6
    CoreSuite

    CoreSuite

    CoreView

    Our best Microsoft 365 (formerly Office 365) management solutions in one powerful platform. With CoreSuite, you get everything you need to delegate, automate, secure and improve your company’s productivity with Microsoft 365 (M365). For enterprises, M365 admin tasks are multiplied across thousands of employees and multiple geographies. CoreSuite’s single platform approach makes it easy to delegate admin tasks, automate alerts and facilitate adoption. CoreSuite offers one unified dashboard that allows users to seamlessly shift between tasks like calculating chargebacks and preempting data breaches to onboarding new employees and tracking longterm product adoption.
  • 7
    Microsoft Entra ID
    Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control.
  • 8
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.
  • 9
    AWS Directory Service
    AWS Directory Service for Microsoft Active Directory, also known as AWS Managed Microsoft Active Directory (AD), enables your directory-aware workloads and AWS resources to use managed Active Directory (AD) in AWS. AWS Managed Microsoft AD is built on actual Microsoft AD and does not require you to synchronize or replicate data from your existing Active Directory to the cloud. You can use the standard AD administration tools and take advantage of the built-in AD features, such as Group Policy and single sign-on. With AWS Managed Microsoft AD, you can easily join Amazon EC2 and Amazon RDS for SQL Server instances to your domain, and use AWS End User Computing (EUC) services, such as Amazon WorkSpaces, with AD users and groups. AWS Managed Microsoft AD makes it easy to migrate AD-dependent applications and Windows workloads to AWS. With AWS Managed Microsoft AD, you can use Group Policies to manage EC2 instances and run AD-dependent applications in the AWS Cloud.
  • 10
    Hyena

    Hyena

    SystemTools Software

    Used by tens of thousands of system administrators worldwide for twenty-five (25) years, Hyena is known throughout the industry as one of the top Windows and Active Directory management utilities available...at any price! It is designed to both simplify and centralize nearly all of the day-to-day management tasks, while providing new capabilities for system administration. This functionality is provided in a single, centralized, easy to use product. Whether your organization is using Windows 2003, Windows 2019 or anything and everything in between, you can manage everything with one tool. Hyena, our comprehensive and award-winning Active Directory and Windows system management software, now includes multiple ways to mass-update Active Directory information : Use the new Active Task feature for mass updating and importing of Active Directory information, or use the Active Editor, an interactive Active Directory editor that lets you freely move around and modify directory information.
  • 11
    Zoho Directory
    Zoho Directory is a cloud-based identity and access management platform designed to streamline authentication, authorization, and user management for organizations. It offers Single Sign-On (SSO) capabilities, allowing employees to access multiple applications with a single set of credentials, thereby enhancing security and user convenience. The platform supports Multi-Factor Authentication (MFA), adding an extra layer of protection against unauthorized access. Device authentication ensures secure access to both applications and devices, enabling employees to use the same credentials across platforms. Zoho Directory also provides robust provisioning features, allowing IT administrators to create and manage user profiles across various applications directly from the platform, reducing the time spent on repetitive tasks. Integration with existing directories, such as Microsoft Active Directory and Azure AD, is facilitated through directory stores.
    Starting Price: $1.70/user/month
  • 12
    ActivMan

    ActivMan

    ANB Software Ltd

    ActivMan takes all the good features of Microsoft's Active Directory Users MMC snapin, and adds some extremely useful features, i.e. mass manipulation, templates, importing of users, and extracting using directly from your MIS (e.g. SIMS), whilst also improving the efficiency of managing users. ActivMan is an out-of-the-box Active Directory user manager designed to be easy-to-use and to drastically improve the process of creating new user accounts, home directories, and shares of new students and staff, whilst also disabling/moving/deleting (optionally) students and staff who have left. It has all the essential features an organisation requires in order to drastically improve the process of managing user accounts. In essence, ActivMan will synchronise your Active Directory network to your MIS. With new features and customer requests being developed all the time, ActivMan is the perfect choice as your user manager solution.
  • 13
    Vyapin Microsoft 365 Manager

    Vyapin Microsoft 365 Manager

    Vyapin Software Systems

    Vyapin Microsoft 365 Manager is a one-stop O365 solution that bridges the gaps in native Office 365 Portal to manage Users, Groups, Licenses, Permissions & More. The software provides automated features for Office 365 License Management, User provisioning and deprovisioning in bulk, administration of Users, Groups, including Security groups and Distribution groups, and mailbox permissions management without using Powershell scripts. With complete audit trails for all administrative tasks, you can manage Office 365 straight from the Desktop in just a few clicks ensuring that the health and security of your Office 365 is never compromised. When it comes to automation and administrative tasks that can be done in bulk, the native Office 365 Management portal falls short in several areas. When provisioning users, administrators must perform a series of tasks that allows users to get going with their work from day one without wait.
  • 14
    Nuvolex

    Nuvolex

    Nuvolex

    Nuvolex Enables IT Organizations to simplify daily administration across all M365 and Azure workloads, leveraging extensive workflow automation. IT Organizations can easily manage all of their Users, Tenants, Licenses and Microsoft Cloud Services through the ManageX™Single Pane Of Glass administration portal. Ability to push multiple M365 configuration changes and Polices to any number of tenants in just a few mouse clicks. Save M365 service configurations and Policies as a template to ensure consistent and compliant configuration policies for all the end tenants managed by your team. Gain valuable insight into all of your Tenant’s data to drive increased security and lower TCO of your Cloud Services. View a single consolidated report to gain insight into your tenants usage, metrics and licensing.
  • 15
    SysTools Active Directory Management
    Active directory management tool allows to edit, remove, create bulk users in AD. Allows to batch migrate user to new domain active directory. List, preview, and manage active directory user accounts from the computer. Provides an option to rollback active directory changes. Create multiple users in active directory directly from software home screen. Allows to move user account from one OU to another OU (Organizational Unit). Allows to find, delete, change, rename, and create organizational unit in AD. Active Directory Admin Username and Password are required. MS Exchange Server should be available and active on the user machine. Through AD Console, its administrator can perform multiple tasks right from a single panel. It is possible to perform numerous operations such as, create a new user or organizational unit, delete user, modify user attributes, move AD user to another OU, and if required, undo all the changes using rollback options.
  • 16
    Heimdal Application Control
    Heimdal Application Control is a novel approach to integrative application management and user rights curation. Modular and easy to set up, App Control empowers the system administrator to create all-encompassing rule-based frameworks, streamline auto-dismissal or auto-approval flows, and enforce individual rights per Active Directory group. The tool’s uniqueness comes from its ability to perfectly pair with a (PAM) Privileged Access Management solution, imparting the user with granular oversight of software inventories and hardware assets.
  • 17
    Netwrix PingCastle
    Netwrix Active Directory Risk Assessment is a free tool that identifies security gaps in your Active Directory and Group Policy. It provides visibility into account permissions and configurations, helping to detect and mitigate potential risks. The tool offers a comprehensive report detailing vulnerabilities, such as accounts with passwords set to never expire, disabled accounts that are not securely managed, and accounts with high privileges. By highlighting these issues, it enables organizations to take corrective actions to enhance their security posture. The assessment is straightforward to use, requiring no installation; it runs as a portable executable, making it convenient for IT administrators to evaluate their Active Directory environments quickly. Regular use of this tool can assist in maintaining a secure and compliant IT infrastructure by proactively identifying and addressing potential security weaknesses.
  • 18
    GPOADmin
    Simplify Active Directory group policy management and governance. GPOADmin is a third-party group policy management and governance solution that allows you to search, administer, verify, compare, update, roll back and consolidate GPOs to ensure consistency and avoid long-term GPO proliferation. GPO comparison features combined with enhanced security and workflow capabilities means controlling and securing your Windows infrastructure while supporting governance initiatives. Getting GPOs right is critical, one wrong GPO with a seemingly innocuous setting can inflict massive detrimental effects to the security posture of thousands of systems in your network within minutes. With GPOADmin, you can automate critical Group Policy management and governance tasks to reduce risk and eliminate manual processes. Improve GPO auditing and verify setting consistency quickly and easily with advanced, side-by-side GPO version comparisons at various intervals.
  • 19
    DynamicGroup

    DynamicGroup

    FirstAttribute

    FirstWare DynamicGroup is a powerful tool to automate group memberships of AD objects. It accelerates processes and reduces the workload for IT-departments. It allows saving in real time and higher security through group memberships which are always up-to-date. Organizing groups in Active Directory does not have to be complicated: With DynamicGroup IT-administrators arrange group memberships in a matter of seconds.
  • 20
    my-IAM TeamSpace

    my-IAM TeamSpace

    FirstAttribute AG

    With my-IAM TeamSpace, you create a compliance-oriented way of working with Microsoft Teams. Both IT admins and users use and manage Teams through my-IAM TeamSpace. M365 admins define security settings for teams, which they categorize and map into templates. Responsibilities, permissions, data security and granular customizations are defined in advance. The big advantage: employees then take over the regulated and controlled administration of teams.
  • 21
    ManageEngine M365 Manager Plus
    M365 Manager Plus is an extensive Microsoft 365 tool used for reporting, managing, monitoring, auditing, and creating alerts for critical activities. With its user-friendly interface, you can easily manage Exchange Online, Azure Active Directory, Skype for Business, OneDrive for Business, Microsoft Teams, and other Microsoft 365 services all from one place. M365 Manager Plus provides exhaustive preconfigured reports on Microsoft 365 and helps you perform complex tasks including bulk user management, bulk mailbox management, secure delegation, and more. Monitor Microsoft 365 services around the clock, and receive instant email notifications about service outages. M365 Manager Plus eases compliance management with built-in compliance reports and offers advanced auditing and alerting features to keep your Microsoft 365 setup secure.
  • 22
    LoginTC

    LoginTC

    Cyphercor

    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more with it's innovative 2fa software. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC was built with the principle that administrators are users too, and offers a solution that's not just easy for end users day-to-day, but is also simple for administrators to manage and setup. In fact, if you aren't set-up in one hour, the first month of your subscription is on us. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
  • 23
    Cayosoft Administrator
    Purpose-built for hybrid and cloud Microsoft environments, Cayosoft Administrator secures, automates, and streamlines day-to-day IT administration. Cayosoft Administrator is the only complete management solution for your entire cloud IT journey, from on-premises to hybrid, to the cloud. Every step of the way, Cayosoft Administrator improves security, efficiency, and compliance in the day-to-day management of Active Directory, Exchange, Office 365, and beyond! Role-based delegation provides complete control of what day-to-day administrators and help desk staff can see and do. Cayosoft allows you to delegate across and between systems with one unified set of easy-to-configure Roles enforce a granular, least-privileged administrative model over all of the systems being managed, even in complex hybrid environments. Roles do not require the user to hold native permissions, dramatically reducing the number of individuals requiring Domain, Enterprise, or Global Admin access.
  • 24
    Netwrix GroupID
    The user accounts and groups in your Active Directory and Microsoft Entra ID (formerly Azure AD) provide access to your sensitive data and systems. But trying to manage groups and users manually is a huge burden on your precious IT resources and often leads to errors that create security vulnerabilities. Netwrix GroupID automates and delegates group and user management to ensure your directories remain current, empowering you to enhance security while increasing IT productivity. Create queries that dynamically determine group membership based on users’ current attributes. In addition, ensure any attribute change to a parent group is automatically reflected in its child groups. Automatically provision and deprovision user accounts by syncing data from an authoritative source such as your HRIS platform. Sync changes to groups and users across identity stores in near real time — without any third-party connector.
  • 25
    Adaxes

    Adaxes

    Softerra

    Adaxes is a management and automation solution that provides enhanced administration experience to Active Directory, Exchange and Microsoft 365 environments. Adaxes features a rule-based platform for Active Directory, Exchange and Microsoft 365 automation, provides an enhanced web-based management environment, gives you a role-based access control model for delegating privileges, adds security with approval-based workflow, allows enforcing corporate data standards and much more. With Adaxes all user lifecycle management procedures can be fully automated, including provisioning, re-provisioning and deprovisioning in Active Directory and connected systems, such as Exchange, Microsoft 365 and Skype for Business. Adaxes Web Interface allows managing Active Directory from any device via a standard web browser. It provides a clean and intuitive UI for admins, help desk and other staff to execute their AD administration tasks and a self-service portal for regular users.
    Starting Price: $1,600 one-time payment
  • 26
    Cygna Auditor

    Cygna Auditor

    Cygna Labs

    Audit and roll back AD changes, enforce entitlements, and improve compliance reporting. Request a demo. Pinpoint changes and instantly roll back unwanted changes to Active Directory to recover from errors with minimal effort. Audit, alert and report on Windows file system and NetApp access faster and with greater detail than native auditing. Get real-time auditing, analysis, and alerts for Microsoft Exchange, and report on changes made to SQL Server. Cygna Auditor provides centralized real-time change auditing for Active Directory, file systems, Exchange, SQL and NetApp; offers the ability to restore Active Directory objects or attributes; and helps to establish and enforce entitlements across the Windows infrastructure. Through simpler administration, IT organizations can mitigate the risks of unwanted changes and better understand user activity to meet compliance requirements.
  • 27
    OneLogin

    OneLogin

    OneLogin

    Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more.
  • 28
    AD Bridge

    AD Bridge

    BeyondTrust

    Extend Microsoft® Active Directory authentication, single sign-on capabilities, and group policy configuration management to Unix & Linux systems with AD Bridge. Consistent tools across the enterprise. Provide a single familiar toolset to manage both Windows and Unix/Linux systems. Streamline compliance processes. Provide thorough audit details to audit and compliance teams and manage group policies centrally. Extend security policies. Expand single sign-on (SSO) and file sharing, and control access to non-Windows systems. BeyondTrust AD Bridge centralizes authentication for Unix and Linux environments by extending Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. By extending group policy to non-Windows platforms, BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. Extend native group policy management tools to include settings for Unix and Linux.
  • 29
    Active Roles

    Active Roles

    One Identity

    Simplify identity management and security with visibility of all Entra ID (Azure AD) tenants, Microsoft 365, and Active Directory domains from a single pane of glass. Ensure users and objects have fine-grained privileged access only when they need it with dynamic delegation across your identity landscape. Automate manual processes to increase efficiency and security while accelerating account, group, and directory management. Manage all Active Directory domains, Entra ID (Azure AD), and Microsoft 365 tenants from a single pane of glass with our Microsoft solution. Control access and permissions with dynamic rules, group families, and policies with automation. Manage users, groups, roles, contacts, Microsoft 365 licenses, and objects with configurable workflows and customizable scripts. Seamless integration of Active Roles with AWS Directory Service for a zero-trust least privilege model, access delegation, and synchronized on-prem user data.
  • 30
    Netwrix Threat Prevention
    Audit and block any ad changes, authentications, or requests. Monitor and prevent unwanted and unauthorized activities in real-time for Active Directory security and compliance. For years, organizations have struggled to obtain contextual, actionable intelligence from their critical Microsoft infrastructure to address security, compliance, and operational requirements. Even after filling SIEM and other log aggregation technologies with every event possible, critical details get lost in the noise or are missing altogether. As attackers continue to leverage more sophisticated methods to elude detection, the need for a better way to detect and control changes and activities that violate policy is vital to security and compliance. Without any reliance on native logging, Netwrix Threat Prevention is able to detect and optionally prevent any change, authentication, or request against Active Directory in real-time and with surgical accuracy.
  • 31
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 32
    LDAP Administrator
    Work with several servers at once, organize them in groups, and easily copy data between them. LDAP Administrator supports LDAPv2 and LDAPv3 protocols and allows working with OpenLDAP, Netscape/iPlanet, Novell eDirectory, Oracle Internet Directory, Lotus Domino, Microsoft Active Directory, CA Directory, Siemens DirX, and any other LDAP server. Set various LDAP filters to display only the entries that match your criteria. Quickly access frequently viewed branches by setting a custom base DN to start browsing from. Jump to previously viewed objects using navigation history. And much more. Prevent directory data from being accidentally modified or deleted by making your LDAP server profiles read-only in LDAP Administrator.
    Starting Price: $250 one-time payment
  • 33
    Netwrix Usercube
    Identity Governance and Administration (IGA) brings together all of an organization’s processes to enable each identified individual to have the correct access rights at the right time for the right reasons. The directory is powered by real-time movement of people, administration tasks and personal updates through the self-service screen. This constantly ensures a very high level of accuracy of the information contained. Inside organizations, people frequently move around (hires, departures, subsidiary creations, office closings, reorganizations, moves. Because the company’s organization is modeled in Usercube, workflows inform the necessary people in real time, making these actors more efficient and therefore reducing wasted time with each change. Additionally, the constantly-updated repository and the traceability of all requests allows easy generation of compliance reports.
  • 34
    Netwrix Recovery for Active Directory
    Fine-grained rollback and recovery for Active Directory. Malicious or accidental changes to AD represent a significant security and performance risk. As the primary authentication and authorization service for the majority of IT systems, the importance of Active Directory (AD) integrity and availability is paramount. Rolling back or recovering changes – whether from human error or malicious intent – leveraging native AD capabilities is difficult at best, and in some cases impossible. While the AD Recycle Bin, when enabled, can recover a deleted object, Microsoft does not offer an out-of-the-box way to rollback changes to directory objects to a previous state. Netwrix Recovery for Active Directory enables organizations to quickly and easily rollback and recover unintended directory changes. e. Easily browse multiple snapshots and leverage granular full text search to effortlessly rollback and recover only the information that is required.
  • 35
    BAAR-IGA

    BAAR-IGA

    BAAR Technologies Inc.

    BAARIGA automates identity, governance, and administration for your environment. Legacy applications, mainframes, and new-age applications. BAARIGA will action new users, terminated users as well as a change to a user (e.g. designation change) in a fully automated way. This extends to the creation of an ID, and email ID as well as buying licenses. Access provisioning to applications that use the Active Directory for authentication and authorization, as well as applications that self-authenticate users. Legacy as well as new age apps. Automated user access review. BAARIGA has data collection nodes that collect access info directly from applications. Access is revoked automatically if needed. Single sign-on for legacy as well as single sign-on compliant applications. The SSO component of BAARIGA provides a secure way to ensure a user needs to have access to just one password. BAARIGA will check to see if there are users who have conflicting roles in applications.
  • 36
    Syskit Point
    Syskit Point is a governance, management, and reporting platform for Microsoft 365 that helps organizations control access, ensure compliance, and reduce security risks. It provides centralized visibility across SharePoint, OneDrive, Teams, and Power Platform, with automated access reviews, bulk user management, and detailed risk reporting. Syskit Point supports storage optimization, lifecycle management, and Microsoft Copilot readiness, helping prevent oversharing and workspace sprawl. Scalable and easy to use, it serves both regulated and non-regulated industries like finance, healthcare, and manufacturing, empowering IT teams to enhance security and simplify Microsoft 365 management.
    Starting Price: $10.00/per user/per year
  • 37
    Delinea Server Suite
    Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. Privileged Access Management best practices are easy to follow with the Server Suite. The results are higher levels of identity assurance and a significantly reduced attack surface with fewer identity silos, redundant identities, and local accounts. Manage privileged user and service accounts from Windows and Linux in Active Directory. Just-in-time, fine-grained access control with RBAC and our patented Zones technology. Complete audit trail for security review, corrective action, and compliance reporting.
  • 38
    Core Security Access Assurance Suite
    As part of the Core Security Identity Governance and Administration portfolio of solutions, previously known as Courion, Access Assurance Suite is an intelligent identity and access management (IAM) software solution that enables organizations to deliver informed provisioning, meet ongoing regulatory compliance, and leverage actionable analytics for improved identity governance. Comprised of four industry-leading modules, our identity management software offers the most intelligent and efficient path to mitigating identity risk, and provides a complete solution for streamlining the provisioning process, reviewing access requests, managing compliance, and enforcing robust password management. A convenient web portal where end users can request access and managers can review, approve, or deny access. Using a shopping cart approach, Core Access delivers an efficient and user-friendly experience, replacing paper forms, emails, and tickets used to manage access.
  • 39
    ZeroTek

    ZeroTek

    ZeroTek

    ZeroTek is a multi-tenant IAM SaaS platform purpose-built for managed service providers to deploy, manage, and scale Okta identity services across multiple customers from a single environment. It extends Okta’s enterprise-grade identity and access management capabilities with MSP-specific tooling that simplifies multi-client operations, enabling providers to deliver secure authentication, single sign-on, and lifecycle management as a monthly service. It provides a centralized dashboard that lets teams view and manage multiple customer directories, users, and applications in one place, reducing operational complexity and improving visibility. ZeroTek also enables self-service Okta tenant creation in seconds, allowing faster customer onboarding without lengthy procurement or licensing processes. MSP-focused role-based access control enforces least-privilege permissions for technicians, while comprehensive auditing ensures full accountability across environments.
  • 40
    LDAP Plus AD Help Desk Professional Tool
    LDAP Plus AD Help Desk Professional Tool is a powerful Active Directory & LDAP administration, reporting and help desk solution. This is a professional tool to manage accounts, assign permissions to users, lock/unlock users accounts and manage other network directory systems. This tool provides both LDAP and Active Directory reports that assist in both compliance (SOX, HIPAA) and management reporting.This tool provides help desk personals and administrators with an interface for single point of administration to manage both Active Directory and LDAP. LDAP Plus AD Help Desk Professional Tool provides a very simple windows like interface to generate both AD and LDAP reports which you can print or export to various formats (Excel, csv and LDIF). It also provides a very simple and easy wizard to schedule reports using windows scheduler or Linux cron.
    Starting Price: $795 one-time payment
  • 41
    RapidIdentity

    RapidIdentity

    Identity Automation

    Identity Automation delivers the most scalable, full-lifecycle identity, access, governance, and administration solution. As the company's flagship product, RapidIdentity helps organizations increase business agility, embrace security, and deliver an enhanced user experience. For organizations looking to streamline security, reduce risk from network and data breaches, and lessen IT costs, use RapidIdentity today!
  • 42
    ADREPLSTATUS

    ADREPLSTATUS

    Microsoft

    The Active Directory Replication Status Tool (ADREPLSTATUS) analyzes the replication status for domain controllers in an Active Directory domain or forest. ADREPLSTATUS displays data in a format that is similar to REPADMIN /SHOWREPL * /CSV imported into Excel but with significant enhancements. Expose Active Directory replication errors occurring in a domain or forest. Prioritize errors that need to be resolved in order to avoid the creation of lingering objects in Active Directory forests. Help administrators and support professionals resolve replication errors by linking to Active Directory replication troubleshooting content on Microsoft TechNet. Allow replication data to be exported to source or destination domain administrators or support professionals for offline analysis. Use FIPS 140 compliant cryptographic algorithms, including encryption, hashing and signing algorithms.
  • 43
    Change Auditor

    Change Auditor

    Quest Software

    Change reporting and access logging for Active Directory (AD) and enterprise applications is cumbersome, time-consuming and, in some cases, impossible using native IT auditing tools. This often results in data breaches and insider threats that can go undetected without protections in place. Fortunately, there's Change Auditor. With Change Auditor, you get complete, real-time IT auditing, in-depth forensics and security threat monitoring on all key configuration, user and administrator changes for Microsoft Active Directory, Azure AD, Exchange, Office 365, file servers and more. Change Auditor also tracks detailed user activity for logons, authentications and other key services across enterprises to enhance threat detection and security monitoring. A central console eliminates the need and complexity for multiple IT audit solutions.
  • 44
    Govern 365

    Govern 365

    Netwoven

    Govern 365 is a Microsoft-native governance and compliance VDR solution that enables secure, self-service collaboration across Teams, SharePoint, and Viva Engage. It offers AI-powered productivity through Govern 365 Copilot, secure virtual data rooms (VDRs), and automated lifecycle management, all while ensuring full data sovereignty by storing content exclusively within the organization’s own Microsoft 365 tenant. With no user limits, seamless Microsoft Purview integration, and tailored solutions for industries like Life Sciences, Healthcare, Legal, and Finance, Govern 365 stands apart from competitors by combining deep native integration, robust security, and unmatched scalability. Schedule a demo today!
  • 45
    Quest Enterprise Reporter
    Security and system administrators have a broad range of responsibilities, including achieving and maintaining IT security and compliance across their Microsoft environments. But, as organizations grow both on-premises and expand into the cloud, they often lack visibility into users, groups, permissions, applications and more which can result in compromised security and potential data loss. Knowing who can access what information in your Microsoft environment is imperative for keeping your data and users secure. With Enterprise Reporter, you can gain visibility into your critical Microsoft configurations — from Active Directory and Exchange to teams and OneDrive for Business. Our comprehensive reporting solution enhances compliance with security best practices and internal policies while helping you ensure compliance with external regulatory mandates, including HIPAA, GDPR, PCI, SOX, FISMA, and more.
  • 46
    Amazon Verified Permissions
    Amazon Verified Permissions is a fully managed authorization service that uses the provably correct Cedar policy language, so you can build more secure applications. With Verified Permissions, developers can build applications faster by externalizing authorization and centralizing policy management. They can also align authorization within the application with Zero Trust principles. Security and audit teams can better analyze and audit who has access to what within applications. Accelerate application development by decoupling authorization from business logic. Protect application resources and manage user access to the principle of least privilege. Amazon Verified Permissions is a fully managed, Cedar-compatible permissions management and fine-grained authorization service for the applications that you build. Using Cedar, an expressive, performant, and analyzable open source policy language, developers and admins can define policy-based access controls.
    Starting Price: $0.00015 per request
  • 47
    Quest ControlPoint

    Quest ControlPoint

    Quest Software

    Confidently secure and protect your SharePoint environment from internal and external threats by with comprehensive permissions management, auditing, reporting and governance policy enforcement. With Quest ControlPoint, you can manage, secure, automate and govern your entire SharePoint environment—whether it’s an on-premises, Microsoft 365 or hybrid SharePoint deployment. Ensure permission policy compliance and prevent security breaches and unauthorized access to sensitive content. Audit, clean up and manage SharePoint permissions and users from a single console across all sites, site collections or farms. Analyze and manage all aspects of permissions whether they are directly assigned, inherited or granted through Active Directory or SharePoint groups.
  • 48
    LogMeOnce

    LogMeOnce

    LogMeOnce

    A formidable cyber security defense should be mindful to thwart internal and external threats. External and internal threats have one common denominator. The end user’s adherence to security, policy, and best practices. External elements exploit an unsuspecting internal user’s adherence to sound security policies to find their way in. Granted, external threats can be addressed with various mechanisms such as firewalls, but, inherently it has its roots and seeds in weak internal shortcomings. However, you can easily curb internal threats by simply establishing “automatic & enforceable” security policies, advising end-users to adhere to secure access protocols with trusted credentials. Thankfully, LogMeOnce Patented Technology offers plenty of ways to protect your team members, credentials, and agency with advanced automated authentication. LogmeOnce dashboard creates powerful and unified access to a user’s entire disparate/numerous set of applications.
    Starting Price: $3 per user per month
  • 49
    Visual Identity Suite

    Visual Identity Suite

    Core Security (Fortra)

    As part of the Core Security Identity Governance and Administration portfolio of solutions, previously offered by Courion, Visual Identity Suite (VIS) empowers organizations to see user privileges and access certifications in a whole new way, leveraging an intelligent, visual-first approach. By providing an easy-to-use graphical interface, you can see common user entitlements and quickly identify outliers to make informed decisions about who has access to what. VIS enables you to visualize what access looks like in your business, so you can intelligently mitigate identity risk and manage identity chaos within your organization. Mitigating identity risk in your organization requires intelligent and visible identity governance across all of your environments. This means leveraging a visual-first approach for the creation and management of roles and access reviews, combined with intelligence-enabled context, to simplify your identity governance and administration processes.
  • 50
    Authomize

    Authomize

    Authomize

    Authomize continuously detects all effective relationships between both human and machine identities to company assets throughout all your organization’s environments (IaaS, PaaS, SaaS, Data, On-prem), down to the most granular company asset and normalized consistently across apps. Authomize offers a continuously updated inventory of your identities, assets and access policies, blocking unintended access with guardrails and alerting on anomalies and various risks. Authomize’s AI-driven engine harnesses its comprehensive and granular visibility over all of an organization’s environments to construct an optimal set of access policies for any identity-asset relationship. This SmartGroup technology performs continuous access modeling, self-correcting as it incorporates new inputs such as actual usage, activities and decisions you take to create an optimal and accurate permission structure.